First published: Tue May 06 2025(Updated: )
Finit provides fast init for Linux systems. Finit's urandom plugin has a heap buffer overwrite vulnerability at boot which leads to it overwriting other parts of the heap, possibly causing random instabilities and undefined behavior. The urandom plugin is enabled by default, so this bug affects everyone using Finit 4.2 or later that do not explicitly disable the plugin at build time. This bug is fixed in Finit 4.12. Those who cannot upgrade or backport the fix to urandom.c are strongly recommended to disable the plugin in the call to the `configure` script.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Finit | >=4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32022 is classified as a high-severity vulnerability due to its potential to cause random instabilities and undefined behavior within affected systems.
To fix CVE-2025-32022, users should upgrade to a patched version of Finit, as the vulnerability affects all versions from 4.2 and later.
CVE-2025-32022 specifically affects the urandom plugin of Finit, which is enabled by default.
Exploiting CVE-2025-32022 may lead to heap buffer overwrites that can instigate random instabilities in the system.
CVE-2025-32022 affects Finit starting from version 4.2, making earlier versions not vulnerable to this specific exploit.